Netowrk 101 final study

  1. An emerging field that combines more traditional voice networks with modern computer networks
    CTI (Computer-Telephony Integration)
  2. A collection point for wires that interconnect the workstations.
  3. More advanced devices that are replacing hubs and are capable of filtering out unnecessary traffic.
  4. The connecting devices between local area networks and wide area networks.
  5. A Web-based attack that involves sending the victim a e-mail that is designed to look like a legitimate request coming from a well-known company and therby lure the victim into revealing private information.
  6. A Web-based attack in which a user seeking to visit a particula company's Web site is unknowingly redirected to a bogus Web site that looks exactly like that company's official Web site. Hackers do this in order to collect personal information.
  7. A destructive piece of code that hides inside a harmless-looking piece of code, such as an e-mail message or an application macro.
    Trojan horse
  8. A small program that alters the way a computer operates without the knowledge of the computer's users, corrupting data and program files, or altering operating system components, so that the computer operation is impaired or even halted
  9. A common type of virus that is programmed into an attached macro file.Macros viruses hide within an applications macro and is activated when the macro is executed.
    Macro Virus
  10. One of the original forms of viruses, a boot sector virus is usually stored on some form of removable media.When the media is connected to the machine and is used to boot the machine, the virus moves from the media into the host system.
    Boot Sector Virus
  11. These viruses mutate with every infection, thus making them difficult to locate.
    Polymorphic Virus
  12. A virus that infects a piece of executable code such as an .exe or .com
    File infector virus
  13. A special type of virus that copies itself from one system to another over a network, without the assistance of a human being.
  14. A system or combination of systems that supports an access control policy between two networks
  15. Encryption software that has become the de-facto standard for creating secure e-mail messages and encryption of other types of data files.
    Pretty Good Privacy (PGP
  16. A new encryption technique selected by the U.S. government. _____ is based on the Rijndael algorithm and uses 128,192, or 256 bit keys.
    Advanced Encryption Standard (AES
  17. Electronically monitoring data flow and system requests into and out of their system.
    Intrusion detection
  18. A cohesive unite of raw data.
  19. A commercially available packet-switched network taht was designed for transmitting data over fixed lines (as opposed to dial-up lines).
    Frame Relay
  20. A wide area network routing protocol in which each node takes the incoming packet and retransmits it onto every outgoing link.
  21. The telephone line that leaves your house or business; it consists of either four or eight wires
    Local Loop
  22. A methodology for a structured approach for the development of a business system; it includes the following phases: planning, analysis, design, implementation and maintenance.
    Systems Development Life Cycle (SDLC)
Card Set
Netowrk 101 final study
study aid